CVE Alert: CVE-2025-9610 – code-projects – Online Event Judging System
CVE-2025-9610
A vulnerability was determined in code-projects Online Event Judging System 1.0. This issue affects some unknown processing of the file /create_account.php. This manipulation of the argument fname causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. Other parameters might be affected as well.
AI Summary Analysis
Risk verdict
High risk: remote SQL injection with public exploit guidance exists, exploitable without authentication; urgent attention required.
Why this matters
If weaponised, attackers can read or alter data and potentially create or compromise user accounts, undermining data integrity and system availability during events. With an advisory and public disclosure, opportunistic exploitation against internet-facing deployments is likely.
Most likely attack path
Attackers send crafted requests to the vulnerable endpoint to inject SQL via the fname parameter, benefiting from no authentication, no user interaction, and network access. The CVSS metrics indicate remote, unauthenticated access with low complexity and significant potential data impact, though scope remains within the web app’s database and may not automatically grant broader network takeover.
Who is most exposed
Web-facing deployments of the online judging system, especially in small/medium setups or shared hosting with weaker input handling and limited WAF controls, are at highest risk.
Detection ideas
- SQL error messages or database traces appearing in responses or logs linked to create_account.php
- Anomalous fname payloads containing quotes, UNION/SELECT, or other typical SQLi patterns
- Sudden spikes or bursts in requests to create_account.php, especially from single IPs or unusual user agents
- IDS/IPS or WAF alerts for SQL injection indicators
- Unexpected data access following suspicious account creation attempts
Mitigation and prioritisation
- Apply or deploy patch that neutralises SQL injection (parameterised queries/prepared statements) and verify fix in test env.
- Refactor create_account.php to use bound parameters; implement input validation and least-privilege DB accounts.
- Enable strict input sanitisation, implement Web Application Firewall rules for SQLi, and monitor logs/alerts around this endpoint.
- Change-management: redeploy with regression testing; audit for any data exposure or account changes post-fix.
- If KEV true or EPSS ≥ 0.5, treat as priority 1.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.